Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic

被引:20
作者
Cilio, Washington [1 ]
Linder, Michael [1 ]
Porter, Chris [1 ]
Di, Jia [1 ]
Thompson, Dale R. [1 ]
Smith, Scott C. [2 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, ENGR 311, CSCE Dept, Fayetteville, AR 72701 USA
[2] Univ Arkansas, Dept Elect Engn, JBHT CSCE 504, Fayetteville, AR 72701 USA
基金
美国国家科学基金会;
关键词
Side-channel attack; Delay-insensitive asynchronous logic; Dual-rail; NULL Convention Logic; Dual-spacer; Delay element; DYNAMIC VOLTAGE; DESIGN; CIRCUITS; DPA; RESISTANCE; STYLE;
D O I
10.1016/j.mejo.2012.12.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Side-channel attacks have become a prevalent research topic for electronic circuits in security-related applications, due to the strong correlation between data pattern and circuit external characteristics which can be easily measured. By monitoring the power/timing information of a synchronous circuit, an attacker can easily obtain the secret data stored on the device. Although dual-rail asynchronous circuits have more stable power traces, they are still vulnerable to power-based attacks because of the imbalanced loads between the two rails of each signal. Moreover, asynchronous circuits are among the most prone to timing attacks since their delays are strongly data dependent. Dual-spacer dual-rail delay-insensitive Logic ((DL)-L-3), presented in this paper, is able to mitigate both power- and timing-based side-channel attacks. In a (DL)-L-3 circuit, power consumption is decoupled from data pattern by using a dual-spacer protocol which guarantees balanced switching activities between the two rails of each signal, while timing-data correlation is broken by inserting random delays. Three Advanced Encryption Standard cores have been designed using synchronous logic, traditional dual-rail asynchronous logic, and (DL)-L-3. Correlation Power Analysis and Timing Analysis attacks were applied and the results show that the (DL)-L-3 design is able to render both attacks unsuccessful, while the other two circuits have vulnerabilities. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:258 / 269
页数:12
相关论文
共 49 条
  • [1] A novel CMOS logic style with data independent power consumption
    Aigner, M
    Mangard, S
    Menicocci, R
    Olivieri, M
    Scotti, G
    Trifiletti, A
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 1066 - 1069
  • [2] RIJID: Random code injection to mask power analysis based side channel attacks
    Ambrose, Jude Angelo
    Ragel, Roshan G.
    Parameswaran, Sri
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 489 - +
  • [3] Aumonier S., 2007, WORKSH ECRYPT 2007 K
  • [4] Baddam K., 2008, DES AUTOM EMBED SYST
  • [5] Evaluation of dynamic voltage and frequency scaling as a differential power analysis countermeasure
    Baddam, Karthik
    Zwolinski, Mark
    [J]. 20TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: TECHNOLOGY CHALLENGES IN THE NANOELECTRONICS ERA, 2007, : 854 - +
  • [6] Blake I., 2005, ADV ELLIPTIC CURVE C
  • [7] Boracchi G., 200717 DEI POL MIL
  • [8] DPA on quasi delay insensitive asynchronous circuits: Formalization and improvement
    Bouesse, GF
    Renaudin, M
    Dumont, S
    Germain, F
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 424 - 429
  • [9] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [10] Chari S., 1999, 2 ADV ENCRYPTION STA, P133